Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    07-11-2024 22:09

General

  • Target

    91c869c6c2059a9b04ecab65a56cc36ecf6628815ff56e7440ba817d718b5f4e.apk

  • Size

    561KB

  • MD5

    5de6bcdaaf6b7895da66d692600236a6

  • SHA1

    d43afd06f13e04264b9c2ded92ecff5c20472dee

  • SHA256

    91c869c6c2059a9b04ecab65a56cc36ecf6628815ff56e7440ba817d718b5f4e

  • SHA512

    69647a4653530b69835611e941fcad4b4687b8bf57fcb189f0721fd215dcbfbe9f7819ba5e5e3d2206a1ff7062681d9aa29b14a2142ae2ac632aeceeec376f3c

  • SSDEEP

    12288:xRDMUjFWFPb1H/NZ/P784Uz9AuOcPwNphZVAWRMB3RCwG/BEFitn7:xdMUjFWFPJFZ/P78SRWWCRCw4mF2n7

Malware Config

Extracted

Family

octo

C2

https://hepsinezipala4esdim52.com/YzM1YThkNDFkNmQ0/

https://hersenbo67saaaeldai548.com/YzM1YThkNDFkNmQ0/

https://alayinag45idaesaesr5454.com/YzM1YThkNDFkNmQ0/

https://neadamsin45mdeaayaq.com/YzM1YThkNDFkNmQ0/

https://hepsi010malltim21.com/YzM1YThkNDFkNmQ0/

rc4.plain

Extracted

Family

octo

C2

https://hepsinezipala4esdim52.com/YzM1YThkNDFkNmQ0/

https://hersenbo67saaaeldai548.com/YzM1YThkNDFkNmQ0/

https://alayinag45idaesaesr5454.com/YzM1YThkNDFkNmQ0/

https://neadamsin45mdeaayaq.com/YzM1YThkNDFkNmQ0/

https://hepsi010malltim21.com/YzM1YThkNDFkNmQ0/

AES_key

Signatures

Processes

  • com.putidea84
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4307

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.putidea84/cache/jmdxmloeumceekh

    Filesize

    449KB

    MD5

    99d43cc28bd5633ec42e2f58351059a1

    SHA1

    fcec0f7db5b8b33db1fdc59a593fd68829027ff2

    SHA256

    15df5b79abab91dbea4b0f2dc57c6748d8544c03d1925ef1e4120884e8e926b8

    SHA512

    72272a106b0e5daeda6273eaaab572ff56ad9e9abd3be6ae5d1c21c5f03de7a1cc693bbf3fd0d4ae053941da7da9fae5196002d003441f229129126c0d9c8e8d

  • /data/data/com.putidea84/cache/oat/jmdxmloeumceekh.cur.prof

    Filesize

    533B

    MD5

    f68f9ed3c0d3c0c7b7a153118d3e0194

    SHA1

    3eb314f77bdbdd99d5b8643823a6a164692a87ac

    SHA256

    ca7b36c49eaaf269f977d462a54b3705b4b014723c5105e17c72c597ef3c4841

    SHA512

    880a475f68ecb4bef9f5551d6567c4aa889a3372a03d0cb078fc7c5b7e511058751045ee58a87acc842ca6db496cac6feb262c1e398f59e2b13c50711e7b2b17